Certified: The ISACA CISA Audio Course

Episode 50: Shadow IT and End-User Computing


Listen Later

Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.

...more
View all episodesView all episodes
Download on the App Store

Certified: The ISACA CISA Audio CourseBy Dr Jason Edwards